A Personalized Access Control Based on IoT

Jae J. Jang, Jaekun Moon, Im Y. Jung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A personalized access control based on IoT is proposed to improve the unflexible access control. The access control using digital doorlock is designed for the persons who have normal cognitive function because it requires persons to memorize some secret numbers. It is not easy for the weak persons in cognitive function such as the mentally handicapped, the young children and the old people, to adapt to the doorlock. There need their guardians or the 2nd method using a physical thing with equal function of key to get into the important space such as home. However, the physical thing is no more than another object for the weak persons in cognitive function to keep in mind. In addition, social engineering attacks including shoulder surfing increase. This paper addresses the problem of the legacy access control and improves it based on IoT technology.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015
EditorsDong Xiang, Tatsuhiro Tsuchiya, Guojun Wang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages317-318
Number of pages2
ISBN (Electronic)9781467393768
DOIs
StatePublished - 4 Jan 2016
Event21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015 - Zhangjiajie, China
Duration: 18 Nov 201520 Nov 2015

Publication series

NameProceedings - 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing, PRDC 2015

Conference

Conference21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015
Country/TerritoryChina
CityZhangjiajie
Period18/11/1520/11/15

Keywords

  • Convenience
  • Flexibility
  • IoT
  • Personalized Access Control
  • Security Enhancement

Fingerprint

Dive into the research topics of 'A Personalized Access Control Based on IoT'. Together they form a unique fingerprint.

Cite this